Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
10901
Determination of fracture toughness in plain concrete specimens by R curve
Published 2019-07-01“…Experimental tests and computational algorithm are implemented to investigate crack growth phenomena in C0.7 concrete. …”
Get full text
Article -
10902
Attribute-based proxy signature scheme for unmanned aerial vehicle networks
Published 2021-11-01“…It is necessary to use digital signature scheme to protect integrity and authentication of commands sent by command agencies to unmanned aerial vehicle (UAV) in the UAV networks.Moreover, the signature scheme should ensure UAV can receive signature in time and protect privacy of signers.Therefore, an attribute-based proxy signature scheme for UAV networks was proposed and its security was analyzed.The proposed signature scheme has existential unforgeability under selective-attribute and chosen message attacks, and privacy of signers is protected.Its efficiency was analyzed in terms of computation costs and communication costs, and compared with other related signature schemes.The results indicate the proposed signature scheme has less computation costs when its communication costs are at the same level with other signature schemes.…”
Get full text
Article -
10903
On Ruijsenaars-Schneider spectrum from superconformal indices and ramified instantons
Published 2025-02-01“…Second approach uses computations of Nekrasov-Shatashvili limit of 5d N $$ \mathcal{N} $$ = 1* instanton partition functions in the presence of co-dimension two defect. …”
Get full text
Article -
10904
RETRACTED: Bone Age Assessment Based on Deep Convolutional Features and Fast Extreme Learning Machine Algorithm
Published 2022-02-01“…However, it also faces the issue of huge computation overhead in deep features learning. Aiming at this problem, this paper proposes a new DL-based bone age assessment method based on the Tanner-Whitehouse method. …”
Get full text
Article -
10905
An Unusual Cause of Spontaneous Pneumomediastinum: The Mounier-Kuhn Syndrome
Published 2019-01-01“…Diagnosis is made by computed tomography and bronchoscopy. An 81-year-old man presenting with an acute chest pain was referred to the pulmonology department. …”
Get full text
Article -
10906
TRAINING STUDENTS IN ARCHITECTURE IN THE DIGITAL AND ARTIFICIAL INTELLIGENCE ERA
Published 2024-12-01“…With the development of science and technology, computers not only support the design of technical drawings but also affect the architectural creation process, especially artificial intelligence technology. …”
Get full text
Article -
10907
The Application of the Homotopy Perturbation Method and the Homotopy Analysis Method to the Generalized Zakharov Equations
Published 2012-01-01“…HAM is a strong and easy-to-use analytic tool for nonlinear problems. Computation of the absolute errors between the exact solutions of the GZE equations and the approximate solutions, comparison of the HPM results with those of Adomian’s decomposition method and the HAM results, and computation the absolute errors between the exact solutions of the GZE equations with the HPM solutions and HAM solutions are presented.…”
Get full text
Article -
10908
A Visibility-based Angular Bispectrum Estimator for Radio-interferometric Data
Published 2025-01-01“…Considering radio-interferometric observations, we present a fast and efficient estimator to compute the binned angular bispectrum (ABS) from gridded visibility data. …”
Get full text
Article -
10909
Symbol timing recovery algorithm based on ordered statistic of maximum mean power timing for WBAN
Published 2015-05-01“…The symbol timing algorithm based on maximum mean power timing is independent of carrier phase offset,and has the property of capturing timing information fast,which meets the demand of wireless body area networks (WBAN).According to IEEE 802.15.6 standard,the ordered statistic of maximum mean power timing was used to reduce the computational complexity in the symbol timing process.The theoretical analysis and simulation results shows that the proposed algorithm can achieve symbol timing within 32 symbols and reduce the computational complexity by ninety percent at most compared to the original maximum mean power algorithm.The fast synchronization and car-rier-independence property of the proposed algorithm can also make room for carrier-offset recovery and frame synchro-nization.…”
Get full text
Article -
10910
Modal Analysis of In-Wheel Motor-Driven Electric Vehicle Based on Bond Graph Theory
Published 2017-01-01“…To verify the effectiveness of the established model, the results were compared to ones computed on the ground of modal analysis and Newton equations. …”
Get full text
Article -
10911
Recognition method of digital modulation signals over non-Gaussian noise in cognitive radio
Published 2014-01-01“…In cognitive radio system,the traditional methods of digital modulation signals recognition with Alpha stable distribution noise have the problems of poor performance and high computation complexity.A novel recognition method based on correlation coefficient of fractional lower order cyclic spectrum was proposed to solve this problem.The method extracts the recognition characteristic parameters which are five correlation coefficients of the fractional lower order cyclic spectrum’s section and frequency spectrum’s section and projection planes of both,and then decision tree was used as a classifier to achieve digital modulation signals recognition.Simulation results show that the proposed method not only has higher recognition rates and better robustness but also has lower computation complexity in an Alpha stable distribution noise environment,which is more suitable for cognitive radio system.…”
Get full text
Article -
10912
Objectifs et stratégies de publication d’un bulletin de liaison : Le Médiéviste et l’Ordinateur (1979-1989)
Published 2022-12-01“…In 1979, a small group of computer users specialised in medieval history launched a publication of a new type: a newsletter called Le Médiéviste et l’Ordinateur. …”
Get full text
Article -
10913
Low-Complexity Decoding Algorithms for Distributed Space-Time Coded Regenerative Relay Systems
Published 2012-09-01“…Computational complexities of these three decoders are also analyzed. …”
Get full text
Article -
10914
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
Published 2016-05-01“…For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on Montgomery-form elliptic curve cryptography was proposed.This scheme uses the Montgomery elliptic curve to reduce the amount of computation,and to provide mutual authentication between the label and the server,and anonymity and forward security.The analysis showed that the scheme could resist replay attack,tag camouflage attack,server cheat attack,DoS attack,position tracking attack and clone attack.Compared with the existing schemes,the proposed scheme provides high security performance under low memory,computation and communication requirements,and it can meet the security requirements of the RFID system.…”
Get full text
Article -
10915
Distributed locating algorithm for wireless sensor networks-MDS-MAP(D)
Published 2008-01-01“…A new distributed locating algorithm MDS-MAP(D) was proposed,which attempted to improve the perform-ance of node localization in wireless sensor networks.The process of the computation about node relative coordinates and the aggregation from local network to global network are introduced explicitly.Further,the analyses to computational complexity and the simulations of the algorithm are also present.MDS-MAP(D),which is based on node clustering mechanism and uses connectivity of nodes to estimate the coordinates of nodes,reduces the complexity and energy con-sumption of node localization on the absence of distance measurement with high precision.The simulation and analysis results indicate that the complexity of node localization algorithm falls to O(Nm 2),m < N from O(N 3) and the accu-racy is improved 1%~3%.…”
Get full text
Article -
10916
Topological Indices of Total Graph and Zero Divisor Graph of Commutative Ring: A Polynomial Approach
Published 2023-01-01“…The algebraic polynomial plays a significant role in mathematical chemistry to compute the exact expressions of distance-based, degree-distance-based, and degree-based topological indices. …”
Get full text
Article -
10917
Intercarrier interference cancellation based on iterative detection algorithm for OFDM systems over time-varying channels
Published 2006-01-01“…In order to effectically cancel the intercarrier interference(ICI) in the OFDM(orthogonal frequency-division multiplexing) systems,a novel iterative detection algorithm was proposed based on parallel interference cancellation.With the principle of maximize the minimum signal-to-interference and noise power ratio,the received signal was proc-essed by decision,reconstruction and ICI cancellation,iterative algorithm based on ICI cancellation was set up,the flow chart on signal detection was given.On the basis of analysis on time-varying channel,the influence of the normalized Doppler frequency offset on the system performance was investigated.Computer simulation results were presented.Simulation results show that the proposed scheme can improve the system performance significantly by using of the time diversity of time varying channel.The computational complexity can be reduced form O(N 3) toO(N).…”
Get full text
Article -
10918
Postsurgical Prosthetic Rehabilitation after Mandibular Ameloblastoma Resection: A 7-Year Follow-Up Case Report
Published 2021-01-01“…After placement of 6 dental implants, the patient was rehabilitated with a lower hybrid prosthesis fabricated using computer-aided design-computer-aided manufacturing. …”
Get full text
Article -
10919
Comparison of Mechanical Impedance Methods for Vibration Simulation
Published 1996-01-01“…The establishment of validated computer models, coupled with laboratory impedance measurements, can eliminate the overtesting problems inherent with constant motion, infinite impedance testing strategies.…”
Get full text
Article -
10920
Asymmetrical Blood Flow in the Temporal Lobe in the Charles Bonnet Syndrome: Serial Neuroimaging Study
Published 1994-01-01“…She had no deterioration of intelligence. Computed tomography (CT) and magnetic resonance imaging (MRI) showed moderate generalized atrophy, particularly of the temporal lobes. …”
Get full text
Article